Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content

Commit ba60acf

Browse files
committed
Add documentation about running postmasters in FreeBSD jails (use
separate users).
1 parent fac2ba5 commit ba60acf

File tree

1 file changed

+13
-1
lines changed

1 file changed

+13
-1
lines changed

doc/src/sgml/runtime.sgml

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
<!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.366 2006/04/03 23:35:02 tgl Exp $ -->
1+
<!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.367 2006/04/11 19:26:42 momjian Exp $ -->
22

33
<chapter Id="runtime">
44
<title>Operating System Environment</title>
@@ -763,6 +763,18 @@ options "SEMMNS=240"
763763
setting <literal>kern.ipc.shm_use_phys</literal>.
764764
</para>
765765

766+
<para>
767+
If running in FreeBSD jails by enabling <application>sysconf</>'s
768+
<literal>security.jail.sysvipc_allowed</>, <application>postmaster</>s
769+
running in different jails should be run by different operating system
770+
users. This improves security because it prevents one jail from
771+
interfering with shared memory or semaphores in another, and it
772+
allows the PostgreSQL IPC cleanup code to function properly.
773+
(In FreeBSD 6.0 and later the IPC cleanup code doesn't properly detect
774+
processes in other jails, preventing the running of postmasters on the
775+
same port in different jails.)
776+
</para>
777+
766778
<para>
767779
<systemitem class="osname">FreeBSD</> versions before 4.0 work like
768780
<systemitem class="osname">NetBSD</> and <systemitem class="osname">

0 commit comments

Comments
 (0)